Answer: C
Question: 3
A backup system disk copy is missing. What are two of the vulnerabilities that are introduced? Select two.
A. passwords can be directly extracted from VMS$PASSWORD_HISTORY.DATA
B. usernames and their associated privileges can be listed
C. protected system files and data can be read
D. passwords can be directly extracted from SYSUAF.DAT
E. licenses can be extracted from LMF$LURT.DAT

Answer: B,C
Question: 4
When an account is no longer in use, what actions prevent the account from being used while still permitting
subsequent backup and restoration of data with original security attributes such as ownership?
A. immediately remove the files and retain the account
B. immediately DISUSER the account and ensure files have been backed up
C. immediately remove the account and ensure files have been backed up
D. no immediate action, routine "unused account" review will suffice

www.testsexpert.com

2

Answer: B
Question: 5
During migration from DECnet Phase IV to Phase V, the nodenames are registered via the local naming option.
The proxy accounts stop working. What is the common reason for this?
A. the NET$MANAGE rights identifier is required to look up the proxy database entries
B. the NET$PROXY.DAT file needs to be created in addition to the NETPROXY.DAT file
C. proxy entries need the LOCAL name service prefix
D. DECnet over IP is enabled using the DOMAIN naming service

Answer: C
Question: 6
On what is the security context of an executing application based?